Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = HAProxy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 1383 KiB  
Article
Torrent Poisoning Protection with a Reverse Proxy Server
by António Godinho, José Rosado, Filipe Sá, Filipe Caldeira and Filipe Cardoso
Electronics 2023, 12(1), 165; https://doi.org/10.3390/electronics12010165 - 30 Dec 2022
Cited by 1 | Viewed by 6478
Abstract
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually [...] Read more.
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a network or site. A typical DDoS flood attack on a website targets a web server with multiple valid requests, exhausting the server’s resources. The participants in this attack are usually compromised/infected computers controlled by the attackers. There are several variations of this kind of attack, and torrent index poisoning is one. A Distributed Denial-of-Service (DDoS) attack using torrent poisoning, more specifically using index poisoning, is one of the most effective and disruptive types of attacks. These web flooding attacks originate from BitTorrent-based file-sharing communities, where the participants using the BitTorrent applications cannot detect their involvement. The antivirus and other tools cannot detect the altered torrent file, making the BitTorrent client target the webserver. The use of reverse proxy servers can block this type of request from reaching the web server, preventing the severity and impact on the service of the DDoS. In this paper, we analyze a torrent index poisoning DDoS to a higher education institution, the impact on the network systems and servers, and the mitigation measures implemented. Full article
(This article belongs to the Special Issue Network and Mobile Systems Security, Privacy and Forensics)
Show Figures

Figure 1

23 pages, 3846 KiB  
Article
Comparative Analysis of Selected Open-Source Solutions for Traffic Balancing in Server Infrastructures Providing WWW Service
by Paweł Dymora, Mirosław Mazurek and Bartosz Sudek
Energies 2021, 14(22), 7719; https://doi.org/10.3390/en14227719 - 18 Nov 2021
Cited by 5 | Viewed by 2970
Abstract
As the number of users increased over the years, pioneering technologies and solutions in given areas ceased to be sufficient even in terms of performance. Therefore, there was a need for their development or even redesign and redefinition. One of the issues that [...] Read more.
As the number of users increased over the years, pioneering technologies and solutions in given areas ceased to be sufficient even in terms of performance. Therefore, there was a need for their development or even redesign and redefinition. One of the issues that undoubtedly has a huge impact on the current shape of the global network and the way information is processed in it is the issue of traffic balancing, especially the one in the server infrastructure related to the WWW service, providing users with the possibility of efficient and reliable web browsing. The paper presents a comparative analysis of selected open-source solutions used for traffic balancing in server infrastructures providing WWW service based on selected criteria. The designed architecture of the test environment and the test results of selected tools implementing the traffic-balancing functionality are presented. Methodologies, test plans, and comparison criteria are proposed. A comparative analysis of results based on specific criteria was performed. The balance between network traffic optimization and load balancing distribution among servers is crucial for the development of energy-efficient data processing centers. Full article
Show Figures

Figure 1

26 pages, 8966 KiB  
Article
Experimental Setup for Investigating the Efficient Load Balancing Algorithms on Virtual Cloud
by Bhavya Alankar, Gaurav Sharma, Harleen Kaur, Raul Valverde and Victor Chang
Sensors 2020, 20(24), 7342; https://doi.org/10.3390/s20247342 - 21 Dec 2020
Cited by 31 | Viewed by 7902
Abstract
Cloud computing has emerged as the primary choice for developers in developing applications that require high-performance computing. Virtualization technology has helped in the distribution of resources to multiple users. Increased use of cloud infrastructure has led to the challenge of developing a load [...] Read more.
Cloud computing has emerged as the primary choice for developers in developing applications that require high-performance computing. Virtualization technology has helped in the distribution of resources to multiple users. Increased use of cloud infrastructure has led to the challenge of developing a load balancing mechanism to provide optimized use of resources and better performance. Round robin and least connections load balancing algorithms have been developed to allocate user requests across a cluster of servers in the cloud in a time-bound manner. In this paper, we have applied the round robin and least connections approach of load balancing to HAProxy, virtual machine clusters and web servers. The experimental results are visualized and summarized using Apache Jmeter and a further comparative study of round robin and least connections is also depicted. Experimental setup and results show that the round robin algorithm performs better as compared to the least connections algorithm in all measuring parameters of load balancer in this paper. Full article
Show Figures

Figure 1

Back to TopTop